Given a graph, the general problem to cover the maximum number of vertices by a collection of vertex-disjoint long paths seems to escape from the literature. A path containing at least k vertices is considered long. When (k le 3), the problem is polynomial time solvable; when k is the total number of vertices, the problem reduces to the Hamiltonian path problem, which is NP-complete. For a fixed (k ge 4), the problem is NP-hard and the best known approximation algorithm for the weighted set packing problem implies a k-approximation algorithm. To the best of our knowledge, there is no approximation algorithm directly designed for the general problem; when (k = 4), the problem admits a 4-approximation algorithm which was presented recently. We propose the first ((0.4394 k + O(1)))-approximation algorithm for the general problem and an improved 2-approximation algorithm when (k = 4). Both algorithms are based on local improvement, and their theoretical performance analyses are done via amortization and their practical performance is examined through simulation studies.
给定一个图,用顶点不相交的长路径集合覆盖最大数量顶点的一般问题似乎已从文献中消失。至少包含 k 个顶点的路径被认为是长路径。当 (k le 3) 时,这个问题是多项式时间可解的;当 k 是顶点的总数时,这个问题就简化成了哈密顿路径问题,而哈密顿路径问题是 NP-完全的。对于一个固定的 (k ge 4), 这个问题是 NP-难的,已知的加权集打包问题的最佳近似算法意味着一个 k 近似算法。据我们所知,还没有直接为一般问题设计的近似算法;当 (k = 4) 时,该问题允许使用最近提出的 4 近似算法。我们为一般问题提出了第一个 ((0.4394 k + O(1)))近似算法,并在(k = 4) 时提出了一个改进的 2 近似算法。这两种算法都基于局部改进,通过摊销法进行理论性能分析,并通过仿真研究检验其实际性能。
{"title":"Approximation Algorithms for Covering Vertices by Long Paths","authors":"Mingyang Gong, Brett Edgar, Jing Fan, Guohui Lin, Eiji Miyano","doi":"10.1007/s00453-024-01242-3","DOIUrl":"10.1007/s00453-024-01242-3","url":null,"abstract":"<div><p>Given a graph, the general problem to cover the maximum number of vertices by a collection of vertex-disjoint long paths seems to escape from the literature. A path containing at least <i>k</i> vertices is considered long. When <span>(k le 3)</span>, the problem is polynomial time solvable; when <i>k</i> is the total number of vertices, the problem reduces to the Hamiltonian path problem, which is NP-complete. For a fixed <span>(k ge 4)</span>, the problem is NP-hard and the best known approximation algorithm for the weighted set packing problem implies a <i>k</i>-approximation algorithm. To the best of our knowledge, there is no approximation algorithm directly designed for the general problem; when <span>(k = 4)</span>, the problem admits a 4-approximation algorithm which was presented recently. We propose the first <span>((0.4394 k + O(1)))</span>-approximation algorithm for the general problem and an improved 2-approximation algorithm when <span>(k = 4)</span>. Both algorithms are based on local improvement, and their theoretical performance analyses are done via amortization and their practical performance is examined through simulation studies.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2625 - 2651"},"PeriodicalIF":0.9,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141170080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-22DOI: 10.1007/s00453-024-01237-0
Virginia Ardévol Martínez, Florian Sikora, Stéphane Vialette
Given two permutations, a pattern (sigma ) and a text (pi ), Parity Permutation Pattern Matching asks whether there exists a parity and order preserving embedding of (sigma ) into (pi ). While it is known that Permutation Pattern Matching is in (textsc {FPT}), we show that adding the parity constraint to the problem makes it (textsc {W}[1])-hard, even for alternating permutations or for 4321-avoiding patterns. However, the problem remains in (textsc {FPT}) if (pi ) avoids a fixed permutation, thanks to a recent meta-theorem on twin-width. On the other hand, as for the classical version, Parity Permutation Pattern Matching remains polynomial-time solvable when the pattern is separable, or if both permutations are 321-avoiding, but NP-hard if (sigma ) is 321-avoiding and (pi ) is 4321-avoiding.
{"title":"Parity Permutation Pattern Matching","authors":"Virginia Ardévol Martínez, Florian Sikora, Stéphane Vialette","doi":"10.1007/s00453-024-01237-0","DOIUrl":"10.1007/s00453-024-01237-0","url":null,"abstract":"<div><p>Given two permutations, a pattern <span>(sigma )</span> and a text <span>(pi )</span>, <span>Parity Permutation Pattern Matching</span> asks whether there exists a parity and order preserving embedding of <span>(sigma )</span> into <span>(pi )</span>. While it is known that <span>Permutation Pattern Matching</span> is in <span>(textsc {FPT})</span>, we show that adding the parity constraint to the problem makes it <span>(textsc {W}[1])</span>-hard, even for alternating permutations or for 4321-avoiding patterns. However, the problem remains in <span>(textsc {FPT})</span> if <span>(pi )</span> avoids a fixed permutation, thanks to a recent meta-theorem on twin-width. On the other hand, as for the classical version, <span>Parity Permutation Pattern Matching</span> remains polynomial-time solvable when the pattern is separable, or if both permutations are 321-avoiding, but <span>NP</span>-hard if <span>(sigma )</span> is 321-avoiding and <span>(pi )</span> is 4321-avoiding.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2605 - 2624"},"PeriodicalIF":0.9,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141153304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-20DOI: 10.1007/s00453-024-01235-2
Ishan Bansal, Joseph Cheriyan, Logan Grout, Sharat Ibrahimpur
We address long-standing open questions raised by Williamson, Goemans, Vazirani and Mihail pertaining to the design of approximation algorithms for problems in network design via the primal-dual method (Williamson et al. in Combinatorica 15(3):435–454, 1995. https://doi.org/10.1007/BF01299747). Williamson et al. prove an approximation ratio of two for connectivity augmentation problems where the connectivity requirements can be specified by uncrossable functions. They state: “Extending our algorithm to handle non-uncrossable functions remains a challenging open problem. The key feature of uncrossable functions is that there exists an optimal dual solution which is laminar ... A larger open issue is to explore further the power of the primal-dual approach for obtaining approximation algorithms for other combinatorial optimization problems.” Our main result proves that the primal-dual algorithm of Williamson et al. achieves an approximation ratio of (16) for a class of functions that generalizes the notion of an uncrossable function. There exist instances that can be handled by our methods where none of the optimal dual solutions has a laminar support. We present three applications of our main result to problems in the area of network design. (1) A (16)-approximation algorithm for augmenting a family of small cuts of a graph G. The previous best approximation ratio was (O(log {|V(G)|})). (2) A (16cdot {lceil k/u_{min} rceil })-approximation algorithm for the Cap-k-ECSS problem which is as follows: Given an undirected graph (G = (V,E)) with edge costs (c in {mathbb {Q}}_{ge 0}^E) and edge capacities (u in {mathbb {Z}}_{ge 0}^E), find a minimum-cost subset of the edges (Fsubseteq E) such that the capacity of any cut in (V, F) is at least k; (u_{min}) (respectively, (u_{max})) denotes the minimum (respectively, maximum) capacity of an edge in E, and w.l.o.g. (u_{max} le k). The previous best approximation ratio was (min (O(log {|V|}), k, 2u_{max})). (3) A (20)-approximation algorithm for the model of (p, 2)-Flexible Graph Connectivity. The previous best approximation ratio was (O(log {|V(G)|})), where G denotes the input graph.
我们解决了 Williamson、Goemans、Vazirani 和 Mihail 提出的长期悬而未决的问题,这些问题涉及通过初等二元方法设计网络设计问题的近似算法(Williamson 等人,载于《Combinatorica》15(3):435-454, 1995. https://doi.org/10.1007/BF01299747)。Williamson 等人证明了连通性增强问题的近似率为 2,在这种情况下,连通性要求可由不可交函数指定。他们指出"将我们的算法扩展到处理不可交函数仍然是一个具有挑战性的开放问题。不可交函数的主要特点是存在一个层状的最优对偶解......"。一个更大的悬而未决的问题是进一步探索初等二元方法的力量,以获得其他组合优化问题的近似算法"。我们的主要结果证明,Williamson 等人的初等二元算法对一类函数的近似率达到了(16),这类函数概括了不可交叉函数的概念。我们的方法可以处理的情况是,没有一个最优对偶解具有层状支撑。我们介绍了我们的主要结果在网络设计领域问题中的三个应用。(1) (16)-approximation algorithm for augmenting a family of small cuts of a graph G. 以前的最佳近似率是(O(log {|V(G)|})).(2) Cap-k-ECSS 问题的 (16cdot {lceil k/u_{min} rceil }) 近似算法如下:给定一个无向图(G = (V,E)),其边成本为 c(在{mathbb {Q}}_{ge 0}^E中),边容量为 u(在{mathbb {Z}}_{ge 0}^E中),找到一个最小成本的边子集(F(subseteq E ),使得(V, F)中任何切口的容量至少为 k;(u_{min}) (分别为 (u_{max}/))表示 E 中一条边的最小(分别为最大)容量,w.l.o.g. (u_{max} le k )。之前的最佳近似率是(min (O(log {|V|}), k, 2u_{max}))。(3) (p, 2)-Flexible Graph Connectivity 模型的 (20)-approximation 算法。之前的最佳近似率为 (O(log {|V(G)|})), 其中 G 表示输入图。
{"title":"Improved Approximation Algorithms by Generalizing the Primal-Dual Method Beyond Uncrossable Functions","authors":"Ishan Bansal, Joseph Cheriyan, Logan Grout, Sharat Ibrahimpur","doi":"10.1007/s00453-024-01235-2","DOIUrl":"10.1007/s00453-024-01235-2","url":null,"abstract":"<div><p>We address long-standing open questions raised by Williamson, Goemans, Vazirani and Mihail pertaining to the design of approximation algorithms for problems in network design via the primal-dual method (Williamson et al. in Combinatorica 15(3):435–454, 1995. https://doi.org/10.1007/BF01299747). Williamson et al. prove an approximation ratio of two for connectivity augmentation problems where the connectivity requirements can be specified by uncrossable functions. They state: “Extending our algorithm to handle non-uncrossable functions remains a challenging open problem. The key feature of uncrossable functions is that there exists an optimal dual solution which is laminar ... A larger open issue is to explore further the power of the primal-dual approach for obtaining approximation algorithms for other combinatorial optimization problems.” Our main result proves that the primal-dual algorithm of Williamson et al. achieves an approximation ratio of <span>(16)</span> for a class of functions that generalizes the notion of an uncrossable function. There exist instances that can be handled by our methods where none of the optimal dual solutions has a laminar support. We present three applications of our main result to problems in the area of network design. (1) A <span>(16)</span>-approximation algorithm for augmenting a family of small cuts of a graph <i>G</i>. The previous best approximation ratio was <span>(O(log {|V(G)|}))</span>. (2) A <span>(16cdot {lceil k/u_{min} rceil })</span>-approximation algorithm for the Cap-<i>k</i>-ECSS problem which is as follows: Given an undirected graph <span>(G = (V,E))</span> with edge costs <span>(c in {mathbb {Q}}_{ge 0}^E)</span> and edge capacities <span>(u in {mathbb {Z}}_{ge 0}^E)</span>, find a minimum-cost subset of the edges <span>(Fsubseteq E)</span> such that the capacity of any cut in (<i>V</i>, <i>F</i>) is at least <i>k</i>; <span>(u_{min})</span> (respectively, <span>(u_{max})</span>) denotes the minimum (respectively, maximum) capacity of an edge in <i>E</i>, and w.l.o.g. <span>(u_{max} le k)</span>. The previous best approximation ratio was <span>(min (O(log {|V|}), k, 2u_{max}))</span>. (3) A <span>(20)</span>-approximation algorithm for the model of (<i>p</i>, 2)-Flexible Graph Connectivity. The previous best approximation ratio was <span>(O(log {|V(G)|}))</span>, where <i>G</i> denotes the input graph.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2575 - 2604"},"PeriodicalIF":0.9,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141153393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
k-center is one of the most popular clustering models. While it admits a simple 2-approximation in polynomial time in general metrics, the Euclidean version is NP-hard to approximate within a factor of 1.82, even in the plane, if one insists the dependence on k in the running time be polynomial. Without this restriction, a classic algorithm by Agarwal and Procopiuc [Algorithmica 2002] yields an (O(nlog k)+(1/epsilon )^{O(2^dk^{1-1/d}log k)})-time ((1+epsilon ))-approximation for Euclidean k-center, where d is the dimension. We show for a closely related problem, k-supplier, the double-exponential dependence on dimension is unavoidable if one hopes to have a sub-linear dependence on k in the exponent. We also derive similar algorithmic results to the ones by Agarwal and Procopiuc for both k-center and k-supplier. We use a relatively new tool, called Voronoi separator, which makes our algorithms and analyses substantially simpler. Furthermore we consider a well-studied generalization of k-center, called Non-uniform k-center (NUkC), where we allow different radii clusters. NUkC is NP-hard to approximate within any factor, even in the Euclidean case. We design a (2^{O(klog k)}n^2) time 3-approximation for NUkC in general metrics, and a (2^{O((klog k)/epsilon )}dn) time ((1+epsilon ))-approximation for Euclidean NUkC. The latter time bound matches the bound for k-center.
k 中心是最流行的聚类模型之一。虽然在一般度量中,它可以在多项式时间内进行简单的 2 次近似,但如果坚持运行时间对 k 的依赖是多项式的,那么即使在平面上,欧几里得版本也很难在 1.82 倍的范围内进行近似。如果没有这个限制,阿加瓦尔和普罗科皮乌克(Agarwal and Procopiuc)[Algorithmica 2002]的经典算法就会产生一个(O(nlog k)+(1/epsilon )^{O(2^dk^{1-1/d}log k)} )-时间((1+epsilon ))-欧几里得k-中心的近似,其中d是维数。我们证明,对于一个密切相关的问题,即 k-供应商问题,如果希望指数与 k 成亚线性关系,那么维度的双指数依赖是不可避免的。我们还推导出了与 Agarwal 和 Procopiuc 类似的 K-中心和 K-供应商算法结果。我们使用了一种相对较新的工具,即 Voronoi 分离器,它大大简化了我们的算法和分析。此外,我们还考虑了一种经过充分研究的 k 中心广义,即非均匀 k 中心(NUkC),在这种情况下,我们允许不同半径的簇。即使是在欧几里得情况下,NUkC 也很难在任何系数内逼近。我们为一般度量中的NUkC设计了一个(2^{O(klog k)}n^2) 时间的3次近似,并为欧几里得NUkC设计了一个(2^{O((klog k)/epsilon )}dn) 时间的((1+epsilon ))近似。后者的时间约束与 k 中心的约束相匹配。
{"title":"Parameterized Approximation Algorithms and Lower Bounds for k-Center Clustering and Variants","authors":"Sayan Bandyapadhyay, Zachary Friggstad, Ramin Mousavi","doi":"10.1007/s00453-024-01236-1","DOIUrl":"10.1007/s00453-024-01236-1","url":null,"abstract":"<div><p><i>k</i>-center is one of the most popular clustering models. While it admits a simple 2-approximation in polynomial time in general metrics, the Euclidean version is NP-hard to approximate within a factor of 1.82, even in the plane, if one insists the dependence on <i>k</i> in the running time be polynomial. Without this restriction, a classic algorithm by Agarwal and Procopiuc [Algorithmica 2002] yields an <span>(O(nlog k)+(1/epsilon )^{O(2^dk^{1-1/d}log k)})</span>-time <span>((1+epsilon ))</span>-approximation for Euclidean <i>k</i>-center, where <i>d</i> is the dimension. We show for a closely related problem, <i>k</i>-supplier, the double-exponential dependence on dimension is unavoidable if one hopes to have a sub-linear dependence on <i>k</i> in the exponent. We also derive similar algorithmic results to the ones by Agarwal and Procopiuc for both <i>k</i>-center and <i>k</i>-supplier. We use a relatively new tool, called Voronoi separator, which makes our algorithms and analyses substantially simpler. Furthermore we consider a well-studied generalization of <i>k</i>-center, called Non-uniform <i>k</i>-center (NUkC), where we allow different radii clusters. NUkC is NP-hard to approximate within any factor, even in the Euclidean case. We design a <span>(2^{O(klog k)}n^2)</span> time 3-approximation for NUkC in general metrics, and a <span>(2^{O((klog k)/epsilon )}dn)</span> time <span>((1+epsilon ))</span>-approximation for Euclidean NUkC. The latter time bound matches the bound for <i>k</i>-center.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2557 - 2574"},"PeriodicalIF":0.9,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140942241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-13DOI: 10.1007/s00453-024-01233-4
Omer Cohen Sidon, Dana Ron
In this work, we study the problem of approximating the distance to subsequence-freeness in the sample-based distribution-free model. For a given subsequence (word) (w = w_1 ldots w_k), a sequence (text) (T = t_1 ldots t_n) is said to contain w if there exist indices (1 le i_1< cdots < i_k le n) such that (t_{i_{j}} = w_j) for every (1 le j le k). Otherwise, T is w-free. Ron and Rosin (ACM Trans Comput Theory 14(4):1–31, 2022) showed that the number of samples both necessary and sufficient for one-sided error testing of subsequence-freeness in the sample-based distribution-free model is (Theta (k/epsilon )). Denoting by (Delta (T,w,p)) the distance of T to w-freeness under a distribution (p:[n]rightarrow [0,1]), we are interested in obtaining an estimate (widehat{Delta }), such that (|widehat{Delta }- Delta (T,w,p)| le delta ) with probability at least 2/3, for a given error parameter (delta ). Our main result is a sample-based distribution-free algorithm whose sample complexity is (tilde{O}(k^2/delta ^2)). We first present an algorithm that works when the underlying distribution p is uniform, and then show how it can be modified to work for any (unknown) distribution p. We also show that a quadratic dependence on (1/delta ) is necessary.
在这项工作中,我们研究了在基于样本的无分布模型中近似无子序列距离的问题。对于一个给定的子序列(词)(w = w_1 ldots w_k),如果存在索引 (1 le i_1< cdots < i_k le n) ,使得对于每一个 (1 le j le k) (t_{i_{j}} = w_j),一个序列(文本)(T = t_1 ldots t_n)被认为包含 w。否则,T 是无 w 的。罗恩和罗辛(ACM Trans Comput Theory 14(4):1-31, 2022)指出,在基于样本的无分布模型中,对子序列无缺陷进行单边误差测试所必需且充分的样本数是 (Theta (k/epsilon )).用 (Delta (T,w,p))表示 T 在分布 (p.[n]/rightarrow])下与 w 无性的距离:[n]rightrow [0,1]),对于给定的误差参数 (widehat{Delta }) ,我们感兴趣的是得到一个估计值 (widehat{Delta }- Delta (T,w,p)| le delta ),概率至少为 2/3。我们的主要成果是一种基于样本的无分布算法,其样本复杂度为 (tilde{O}(k^2/delta ^2))。我们首先介绍了一种在底层分布 p 是均匀分布时有效的算法,然后展示了如何将其修改为适用于任何(未知)分布 p。
{"title":"Sample-Based Distance-Approximation for Subsequence-Freeness","authors":"Omer Cohen Sidon, Dana Ron","doi":"10.1007/s00453-024-01233-4","DOIUrl":"10.1007/s00453-024-01233-4","url":null,"abstract":"<div><p>In this work, we study the problem of approximating the distance to subsequence-freeness in the sample-based distribution-free model. For a given subsequence (word) <span>(w = w_1 ldots w_k)</span>, a sequence (text) <span>(T = t_1 ldots t_n)</span> is said to contain <i>w</i> if there exist indices <span>(1 le i_1< cdots < i_k le n)</span> such that <span>(t_{i_{j}} = w_j)</span> for every <span>(1 le j le k)</span>. Otherwise, <i>T</i> is <i>w</i>-free. Ron and Rosin (ACM Trans Comput Theory 14(4):1–31, 2022) showed that the number of samples both necessary and sufficient for one-sided error testing of subsequence-freeness in the sample-based distribution-free model is <span>(Theta (k/epsilon ))</span>. Denoting by <span>(Delta (T,w,p))</span> the distance of <i>T</i> to <i>w</i>-freeness under a distribution <span>(p:[n]rightarrow [0,1])</span>, we are interested in obtaining an estimate <span>(widehat{Delta })</span>, such that <span>(|widehat{Delta }- Delta (T,w,p)| le delta )</span> with probability at least 2/3, for a given error parameter <span>(delta )</span>. Our main result is a sample-based distribution-free algorithm whose sample complexity is <span>(tilde{O}(k^2/delta ^2))</span>. We first present an algorithm that works when the underlying distribution <i>p</i> is uniform, and then show how it can be modified to work for any (unknown) distribution <i>p</i>. We also show that a quadratic dependence on <span>(1/delta )</span> is necessary.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2519 - 2556"},"PeriodicalIF":0.9,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01233-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-10DOI: 10.1007/s00453-024-01232-5
Benjamin Doerr, Andrew James Kelley
We propose a new method based on discrete Fourier analysis to analyze the time evolutionary algorithms spend on plateaus. This immediately gives a concise proof of the classic estimate of the expected runtime of the ((1+1)) evolutionary algorithm on the Needle problem due to Garnier et al. (Evol Comput 7:173–203, 1999). We also use this method to analyze the runtime of the ((1+1)) evolutionary algorithm on a benchmark consisting of (n/ell ) plateaus of effective size (2^ell -1) which have to be optimized sequentially in a LeadingOnes fashion. Using our new method, we determine the precise expected runtime both for static and fitness-dependent mutation rates. We also determine the asymptotically optimal static and fitness-dependent mutation rates. For (ell = o(n)), the optimal static mutation rate is approximately 1.59/n. The optimal fitness dependent mutation rate, when the first k fitness-relevant bits have been found, is asymptotically (1/(k+1)). These results, so far only proven for the single-instance problem LeadingOnes, thus hold for a much broader class of problems. We expect similar extensions to be true for other important results on LeadingOnes. We are also optimistic that the Fourier analysis approach can be applied to other plateau problems as well.
{"title":"Fourier Analysis Meets Runtime Analysis: Precise Runtimes on Plateaus","authors":"Benjamin Doerr, Andrew James Kelley","doi":"10.1007/s00453-024-01232-5","DOIUrl":"10.1007/s00453-024-01232-5","url":null,"abstract":"<div><p>We propose a new method based on discrete Fourier analysis to analyze the time evolutionary algorithms spend on plateaus. This immediately gives a concise proof of the classic estimate of the expected runtime of the <span>((1+1))</span> evolutionary algorithm on the Needle problem due to Garnier et al. (Evol Comput 7:173–203, 1999). We also use this method to analyze the runtime of the <span>((1+1))</span> evolutionary algorithm on a benchmark consisting of <span>(n/ell )</span> plateaus of effective size <span>(2^ell -1)</span> which have to be optimized sequentially in a LeadingOnes fashion. Using our new method, we determine the precise expected runtime both for static and fitness-dependent mutation rates. We also determine the asymptotically optimal static and fitness-dependent mutation rates. For <span>(ell = o(n))</span>, the optimal static mutation rate is approximately 1.59/<i>n</i>. The optimal fitness dependent mutation rate, when the first <i>k</i> fitness-relevant bits have been found, is asymptotically <span>(1/(k+1))</span>. These results, so far only proven for the single-instance problem LeadingOnes, thus hold for a much broader class of problems. We expect similar extensions to be true for other important results on LeadingOnes. We are also optimistic that the Fourier analysis approach can be applied to other plateau problems as well.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2479 - 2518"},"PeriodicalIF":0.9,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-09DOI: 10.1007/s00453-024-01230-7
Steven Chaplick, Giordano Da Lozzo, Emilio Di Giacomo, Giuseppe Liotta, Fabrizio Montecchiani
The planar slope number({{,textrm{psn},}}(G)) of a planar graph G is the minimum number of edge slopes in a planar straight-line drawing of G. It is known that ({{,textrm{psn},}}(G) in O(c^{Delta })) for every planar graph G of maximum degree (Delta ). This upper bound has been improved to (O(Delta ^5)) if G has treewidth three, and to (O(Delta )) if G has treewidth two. In this paper we prove ({{,textrm{psn},}}(G) le max {4,Delta }) when G is a Halin graph, and thus has treewidth three. Furthermore, we present the first polynomial upper bound on the planar slope number for a family of graphs having treewidth four. Namely we show that (O(Delta ^2)) slopes suffice for nested pseudotrees.
已知对于每个最大度为 (Delta )的平面图 G,平面斜率数 ({{,textrm{psn},}}(G) in O(c^{Delta })) 为 O(c^{Delta })。如果 G 的树宽为三,那么这个上界将被改进为 (O(Delta ^5));如果 G 的树宽为二,那么这个上界将被改进为 (O(Delta ))。在本文中,我们证明了当 G 是一个哈林图,并且具有三树宽时,({{,textrm{psn},}}(G) le max {4,Delta })。此外,我们还首次提出了树宽为四的图族的平面斜率数的多项式上界。也就是说,我们证明了 (O(Delta ^2)) 斜率对于嵌套伪树来说是足够的。
{"title":"Planar Drawings with Few Slopes of Halin Graphs and Nested Pseudotrees","authors":"Steven Chaplick, Giordano Da Lozzo, Emilio Di Giacomo, Giuseppe Liotta, Fabrizio Montecchiani","doi":"10.1007/s00453-024-01230-7","DOIUrl":"10.1007/s00453-024-01230-7","url":null,"abstract":"<div><p>The <i>planar slope number</i> <span>({{,textrm{psn},}}(G))</span> of a planar graph <i>G</i> is the minimum number of edge slopes in a planar straight-line drawing of <i>G</i>. It is known that <span>({{,textrm{psn},}}(G) in O(c^{Delta }))</span> for every planar graph <i>G</i> of maximum degree <span>(Delta )</span>. This upper bound has been improved to <span>(O(Delta ^5))</span> if <i>G</i> has treewidth three, and to <span>(O(Delta ))</span> if <i>G</i> has treewidth two. In this paper we prove <span>({{,textrm{psn},}}(G) le max {4,Delta })</span> when <i>G</i> is a Halin graph, and thus has treewidth three. Furthermore, we present the first polynomial upper bound on the planar slope number for a family of graphs having treewidth four. Namely we show that <span>(O(Delta ^2))</span> slopes suffice for nested pseudotrees.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2413 - 2447"},"PeriodicalIF":0.9,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01230-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-09DOI: 10.1007/s00453-024-01231-6
Jianer Chen, Qin Huang, Iyad Kanj, Ge Xia
Based on well-known complexity theory conjectures, any polynomial-time kernelization algorithm for the NP-hard Line-Cover problem produces a kernel of size (Omega (k^2)), where k is the size of the sought line cover. Motivated by the current research in massive data processing, we study the existence of kernelization algorithms with limited space and time complexity for Line-Cover. We prove that every kernelization algorithm for Line-Cover takes time (Omega (n log k + k^2 log k)), and present a randomized kernelization algorithm for Line-Cover that produces a kernel of size bounded by (k^2), and runs in time ({mathcal {O}}(n log k + k^2 (log k log log k)^2)) and space ({mathcal {O}}(k^2log ^{2} k)). Our techniques are also useful for developing deterministic kernelization algorithms for Line-Cover with limited space and improved running time, and for developing streaming kernelization algorithms for Line-Cover with near-optimal update-time.
基于众所周知的复杂性理论猜想,任何针对 NP 难的线覆盖(Line-Cover)问题的多项式时间内核化算法都会产生一个大小为 (Omega (k^2)) 的内核,其中 k 是所求线覆盖的大小。受当前海量数据处理研究的启发,我们研究了针对 Line-Cover 问题是否存在空间和时间复杂度有限的内核化算法。我们证明了Line-Cover的每个内核化算法都需要花费时间(Omega (n log k + k^2 log k)),并提出了一种Line-Cover的随机内核化算法,它产生的内核大小以(k^2)为界、并且运行时间({mathcal {O}}(n log k + k^2 (log k log log k)^2))和空间({mathcal {O}}(k^2log ^{2} k))。我们的技术还有助于为 Line-Cover 开发空间有限、运行时间更短的确定性内核化算法,以及为 Line-Cover 开发更新时间接近最优的流式内核化算法。
{"title":"Nearly Time-Optimal Kernelization Algorithms for the Line-Cover Problem with Big Data","authors":"Jianer Chen, Qin Huang, Iyad Kanj, Ge Xia","doi":"10.1007/s00453-024-01231-6","DOIUrl":"10.1007/s00453-024-01231-6","url":null,"abstract":"<div><p>Based on well-known complexity theory conjectures, any polynomial-time kernelization algorithm for the NP-hard <span>Line-</span><span>Cover</span> problem produces a kernel of size <span>(Omega (k^2))</span>, where <i>k</i> is the size of the sought line cover. Motivated by the current research in massive data processing, we study the existence of kernelization algorithms with limited space and time complexity for <span>Line-</span><span>Cover</span>. We prove that every kernelization algorithm for <span>Line-Cover</span> takes time <span>(Omega (n log k + k^2 log k))</span>, and present a randomized kernelization algorithm for <span>Line-</span><span>Cover</span> that produces a kernel of size bounded by <span>(k^2)</span>, and runs in time <span>({mathcal {O}}(n log k + k^2 (log k log log k)^2))</span> and space <span>({mathcal {O}}(k^2log ^{2} k))</span>. Our techniques are also useful for developing deterministic kernelization algorithms for <span>Line-</span><span>Cover</span> with limited space and improved running time, and for developing streaming kernelization algorithms for <span>Line-</span><span>Cover</span> with near-optimal update-time.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2448 - 2478"},"PeriodicalIF":0.9,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-08DOI: 10.1007/s00453-024-01234-3
Magnús M. Halldórsson, Dror Rawitz
We study the Online Multiset Submodular Cover problem (OMSC), where we are given a universe U of elements and a collection of subsets (mathcal {S}subseteq 2^U). Each element (u_j in U) is associated with a nonnegative, nondecreasing, submodular polynomially computable set function (f_j). Initially, the elements are uncovered, and therefore we pay a penalty per each unit of uncovered element. Subsets with various coverage and cost arrive online. Upon arrival of a new subset, the online algorithm must decide how many copies of the arriving subset to add to the solution. This decision is irrevocable, in the sense that the algorithm will not be able to add more copies of this subset in the future. On the other hand, the algorithm can drop copies of a subset, but such copies cannot be retrieved later. The goal is to minimize the total cost of subsets taken plus penalties for uncovered elements. We present an (O(sqrt{rho _{max }}))-competitive algorithm for OMSC that does not dismiss subset copies that were taken into the solution, but relies on prior knowledge of the value of (rho _{max }), where (rho _{max }) is the maximum ratio, over all subsets, between the penalties covered by a subset and its cost. We provide an (Oleft( log (rho _{max }) sqrt{rho _{max }} right) )-competitive algorithm for OMSC that does not rely on advance knowledge of (rho _{max }) but uses dismissals of previously taken subsets. Finally, for the capacitated versions of the Online Multiset Multicover problem, we obtain an (O(sqrt{rho _{max }'}))-competitive algorithm when (rho _{max }') is known and an (Oleft( log (rho _{max }') sqrt{rho _{max }'} right) )-competitive algorithm when (rho _{max }') is unknown, where (rho _{max }') is the maximum ratio over all subset incarnations between the penalties covered by this incarnation and its cost.
{"title":"Online Multiset Submodular Cover","authors":"Magnús M. Halldórsson, Dror Rawitz","doi":"10.1007/s00453-024-01234-3","DOIUrl":"10.1007/s00453-024-01234-3","url":null,"abstract":"<div><p>We study the <span>Online Multiset Submodular Cover</span> problem (<span>OMSC</span>), where we are given a universe <i>U</i> of elements and a collection of subsets <span>(mathcal {S}subseteq 2^U)</span>. Each element <span>(u_j in U)</span> is associated with a nonnegative, nondecreasing, submodular polynomially computable set function <span>(f_j)</span>. Initially, the elements are uncovered, and therefore we pay a penalty per each unit of uncovered element. Subsets with various coverage and cost arrive online. Upon arrival of a new subset, the online algorithm must decide how many copies of the arriving subset to add to the solution. This decision is irrevocable, in the sense that the algorithm will not be able to add more copies of this subset in the future. On the other hand, the algorithm can drop copies of a subset, but such copies cannot be retrieved later. The goal is to minimize the total cost of subsets taken plus penalties for uncovered elements. We present an <span>(O(sqrt{rho _{max }}))</span>-competitive algorithm for <span>OMSC</span> that does not dismiss subset copies that were taken into the solution, but relies on prior knowledge of the value of <span>(rho _{max })</span>, where <span>(rho _{max })</span> is the maximum ratio, over all subsets, between the penalties covered by a subset and its cost. We provide an <span>(Oleft( log (rho _{max }) sqrt{rho _{max }} right) )</span>-competitive algorithm for <span>OMSC</span> that does not rely on advance knowledge of <span>(rho _{max })</span> but uses dismissals of previously taken subsets. Finally, for the capacitated versions of the <span>Online Multiset Multicover</span> problem, we obtain an <span>(O(sqrt{rho _{max }'}))</span>-competitive algorithm when <span>(rho _{max }')</span> is known and an <span>(Oleft( log (rho _{max }') sqrt{rho _{max }'} right) )</span>-competitive algorithm when <span>(rho _{max }')</span> is unknown, where <span>(rho _{max }')</span> is the maximum ratio over all subset incarnations between the penalties covered by this incarnation and its cost.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 7","pages":"2393 - 2411"},"PeriodicalIF":0.9,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01234-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-27DOI: 10.1007/s00453-024-01218-3
Per Kristian Lehre
Co-evolutionary algorithms have a wide range of applications, such as in hardware design, evolution of strategies for board games, and patching software bugs. However, these algorithms are poorly understood and applications are often limited by pathological behaviour, such as loss of gradient, relative over-generalisation, and mediocre objective stasis. It is an open challenge to develop a theory that can predict when co-evolutionary algorithms find solutions efficiently and reliable. This paper provides a first step in developing runtime analysis for population-based competitive co-evolutionary algorithms. We provide a mathematical framework for describing and reasoning about the performance of co-evolutionary processes. To illustrate the framework, we introduce a population-based co-evolutionary algorithm called PDCoEA, and prove that it obtains a solution to a bilinear maximin optimisation problem in expected polynomial time. Finally, we describe settings where PDCoEA needs exponential time with overwhelmingly high probability to obtain a solution.
{"title":"Runtime Analysis of Competitive Co-evolutionary Algorithms for Maximin Optimisation of a Bilinear Function","authors":"Per Kristian Lehre","doi":"10.1007/s00453-024-01218-3","DOIUrl":"10.1007/s00453-024-01218-3","url":null,"abstract":"<div><p>Co-evolutionary algorithms have a wide range of applications, such as in hardware design, evolution of strategies for board games, and patching software bugs. However, these algorithms are poorly understood and applications are often limited by pathological behaviour, such as loss of gradient, relative over-generalisation, and mediocre objective stasis. It is an open challenge to develop a theory that can predict when co-evolutionary algorithms find solutions efficiently and reliable. This paper provides a first step in developing runtime analysis for population-based competitive co-evolutionary algorithms. We provide a mathematical framework for describing and reasoning about the performance of co-evolutionary processes. To illustrate the framework, we introduce a population-based co-evolutionary algorithm called PDCoEA, and prove that it obtains a solution to a bilinear maximin optimisation problem in expected polynomial time. Finally, we describe settings where PDCoEA needs exponential time with overwhelmingly high probability to obtain a solution.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 7","pages":"2352 - 2392"},"PeriodicalIF":0.9,"publicationDate":"2024-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01218-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140812477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}